Security

Getting ready for the New Zealand Privacy Act 2020

Author: John Martin, Senior Security Architect, IBM Cloud and Cognitive Software, New Zealand Are you ready for the New Zealand Privacy Act 2020 to come into effect on 1st December 2020? There’s a lot to consider as the clock ticks down and your organisation’s ability to comply is critical if you want to avoid some […]

Continue reading

How hackers are exploiting COVID-19

Remote working coupled with uncertainty around coronavirus gives hackers leverage into critical data. The Morrison government’s $1.34b investment in bolstering the country’s cybersecurity defences should be taken as a wake-up call to corporate Australia, according to industry experts. While COVID-19 has been a cause for pause for much of the world, for sophisticated cybercriminals it […]

Continue reading

The rising cost of a data breach in 2020

By Stephen Burmester, Asia Pacific Lead – X-Force Incident Response and Intelligence Services (IRIS) Increased remote working and digital footprints have accelerated the importance of cybersecurity in today’s business world. While the cost and risk of a cybersecurity breach are increasing year-on-year, there are measures companies can take to minimise the threat. Although breaches remain […]

Continue reading

Collaborative Threat Defence with IBM and Cisco

Author: Ali Daher, IBM Security Leader A/NZ When it comes to threat defence, it’s a cluttered market out there! There are multiple security vendors and a multitude of tools to solve different security requirements. Common feedback we hear from customers is, wouldn’t it be great to: Reduce product and vendor complexity Streamline workflows between security […]

Continue reading

Cybersecurity: How to stay safe online during COVID-19

The big shift to remote working has meant huge changes in how we do our jobs, including risks we didn’t need to worry about before. COVID-19 isn’t the only pandemic we’re suffering right now. Our digital lives are under unprecedented attack and the very thing that is meant to keep us safe from the actual […]

Continue reading

The need for gender diversity in cybersecurity is real

Author: Pelin Nancarrow, Consulting & System Integration Leader A/NZ I have been helping clients establish guidelines for implementing, maintaining and improving information security management in their organisations for 17 years. Although it has improved, I am often still the only woman in the room. It is now more critical than ever for organizations to attract and retain […]

Continue reading

The value of psychology and cognitive science in Cybersecurity

Author: Fiona Byrnes, AP Managed Security Services Delivery Executive, IBM Security Who is today’s cybercriminal? What new data can be commoditised or code weaponised for disruption? These are common security intelligence questions asked in our client conversations. While these questions are about the preventative tools, testing, analytics, and security methodology, they also have underlining psychology. […]

Continue reading

Cybersecurity needs your skills

Author: Holly Wright, QRadar Flows Product Owner, QFlow Software Engineer, IBM Security A little-known fact about cybersecurity is that it is one of the most diverse industries out there. Think of any company. You’d be hard-pressed to pick one that hasn’t gone through some sort of digital evolution, in some shape or form. Healthcare, finance, mining, […]

Continue reading

From stolen credentials to vulnerability exploits – are you ready to counter emerging threats?

Author: Stephen Burmester, Asia Pacific Regional Leader, X-Force Incident Response and Intelligence Services (IRIS), IBM Security The cyber threat landscape is constantly evolving. As countermeasures negate the effectiveness of one type of attack, malicious actors move to another threat vector. It can seem like an endless game of tit-for-tat, but by knowing what threats to […]

Continue reading

Identity theft: a personal and organisational threat

Author: John Martin, Senior Security Architect, IBM New Zealand Identity theft is a growing phenomenon, affecting as many as 133,000 New Zealanders annually at a cost to the economy of as much as $209 million every year1. Typically, identity theft is used to perform financial transactions using accounts in another person’s name. These can be […]

Continue reading

Whaling: a new front in cybercrime

Author: John Martin, Senior Security Architect, IBM New Zealand Earlier this year, the head of a UK-based energy firm received a call from the CEO of his German parent company. The CEO gave him an urgent directive, instructing the UK executive to send funds to one of the company’s suppliers in Hungary within an hour. […]

Continue reading

Keeping privacy front of mind

Author: John Martin, Senior Security Architect, IBM New Zealand A colleague was telling me recently that he and his wife had been idly viewing an open house on the weekend. It was a routine, everyday moment – but then something caught his attention. The estate agent was using an iPad to allow visitors to register […]

Continue reading